aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorjgh <jgh@FreeBSD.org>2012-05-25 07:46:50 +0800
committerjgh <jgh@FreeBSD.org>2012-05-25 07:46:50 +0800
commit5aa7a40a3447b034c2f5c76fb78c315ed33aaeda (patch)
tree67040975594dc837f6b4d3eab2a255c2219bab78 /security
parent9306648af1b1dc48717b6eb0673c9d2a93cbab13 (diff)
downloadfreebsd-ports-gnome-5aa7a40a3447b034c2f5c76fb78c315ed33aaeda.tar.gz
freebsd-ports-gnome-5aa7a40a3447b034c2f5c76fb78c315ed33aaeda.tar.zst
freebsd-ports-gnome-5aa7a40a3447b034c2f5c76fb78c315ed33aaeda.zip
- document security issue for haproxy
PR: ports/165035 Submitted by: jgh@ Security: CVE-2012-2391
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml36
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index e1599c148b8f..033c89947933 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -52,6 +52,42 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="617959ce-a5f6-11e1-a284-0023ae8e59f0">
+ <topic>haproxy -- buffer overflow</topic>
+ <affects>
+ <package>
+ <name>haproxy</name>
+ <range><lt>1.4.21</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>HAProxy reports:</p>
+ <blockquote cite="http://haproxy.1wt.eu/news.html">
+ <p>A flaw was reported in HAProxy where, due to a boundary error
+ when copying data into the trash buffer, an external attacker could
+ cause a buffer overflow. Exploiting this flaw could lead to the
+ execution of arbitrary code, however it requires non-default settings
+ for the global.tune.bufsize configuration option (must be set to a
+ value greater than the default), and also that header rewriting is
+ enabled (via, for example, the regrep or rsprep directives).
+ This flaw is reported against 1.4.20, prior versions may also be
+ affected.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2012-2391</cvename>
+ <url>https://secunia.com/advisories/49261/</url>
+ <url>http://haproxy.1wt.eu/download/1.4/src/CHANGELOG</url>
+ <url>http://haproxy.1wt.eu/git?p=haproxy-1.4.git;a=commit;h=30297cb17147a8d339eb160226bcc08c91d9530b</url>
+ </references>
+ <dates>
+ <discovery>2012-05-21</discovery>
+ <entry>2012-05-24</entry>
+ </dates>
+ </vuln>
+
<vuln vid="e0a969e4-a512-11e1-90b4-e0cb4e266481">
<topic>RT -- Multiple Vulnerabilities</topic>
<affects>